[Cryptography] Secure erasure
Peter Gutmann
pgut001 at cs.auckland.ac.nz
Sat Sep 10 01:26:21 EDT 2016
John Denker <jsd at av8n.com> writes:
>I recommend:
>
> Laura J. Heath,
> "An Analysis of the Systemic Security Weaknesses of
> the U.S. Navy Fleet Broadcasting System, 1967-1974,
> as Exploited by CWO John Walker"
That's an excellent (I would say must-) read in any case, it documents what
happens when a technical security system designed in a vacuum comes into
contact with the real world. And by that I'm describing not just the crypto
but also the process for obtaining and maintaining a clearance. It's one of
the best security usability writeups I've ever read.
Peter.
More information about the cryptography
mailing list